Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
db71c74cc3eb2b833a06d2232ac99870_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db71c74cc3eb2b833a06d2232ac99870_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db71c74cc3eb2b833a06d2232ac99870_JaffaCakes118.html
-
Size
175KB
-
MD5
db71c74cc3eb2b833a06d2232ac99870
-
SHA1
3bdca56e1a505e8c5224d11d589718a4f9a719c4
-
SHA256
d517b91c05148be6569d190732acbd45abc88305151b09b982370c45292550f2
-
SHA512
899f3bcf89209976c619e7106f6a6cac935c32f8a1260fc4c879b2bec62d295b38acbc8ca93b0378a81fa4e871ea7c8cd3616c788869180d475fe356b77ed95b
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3IGNkFTYfBCJisM+aeTH+WK/Lf1/hmnVSV:S4oT3I/FqBCJium
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 1040 msedge.exe 1040 msedge.exe 2684 identity_helper.exe 2684 identity_helper.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1040 wrote to memory of 3576 1040 msedge.exe 83 PID 1040 wrote to memory of 3576 1040 msedge.exe 83 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 3904 1040 msedge.exe 84 PID 1040 wrote to memory of 4316 1040 msedge.exe 85 PID 1040 wrote to memory of 4316 1040 msedge.exe 85 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86 PID 1040 wrote to memory of 2396 1040 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db71c74cc3eb2b833a06d2232ac99870_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3615581602095927796,12473829690665281059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD506125fb1245b7786285e79b374a64cc0
SHA1cf23ac631f093ffb7a84ac6d8eddff77c1eac8af
SHA2565aaabf7400a2565fc8013f270137ae028afe7a3724c3f3276cde1ad08cd306f7
SHA512030f160f6b1f9afc26bf9a4d1397f6460d621fe4109a561a0eddd246a79d3d22bd1ec306aed0f14e5a42f3cbc4a7073b424c54cfce308ab274b0d795de72e5fb
-
Filesize
2KB
MD5e2d2abf21c7fa1b26f486a67db8f7470
SHA18d2cc864fc18d911496dff1bb8543d15282dbb9c
SHA256f0d827120ce3b1002f59a2accdf853beb6b9a93d5ff4b37da610d6fa38d44003
SHA5124487e2df9587365cd07d0429fa1f357bf5729193cbca5497f03187e2897e49225a074e81ba7398cf47fb4cb230281c6863fdc79a15f54b31db5427216e4fd3aa
-
Filesize
2KB
MD5213e9d86dedae025bfa16ce01737bab7
SHA1dfc9a6651e1dfa27223aed176d4e4c23843e6a04
SHA2561bd105a4385595b8ebfaf12c4fd17d35b6b2116ded97c6ffe68b33f062e2800e
SHA512f154ef02ecff8183aa5726b080cd73fddbf4d63e8b94aa965115a851597e5e53933dae7c6972e730cd9e78f3c26c088062f16884a359d1ca7a6d8f9893168377
-
Filesize
5KB
MD5ac18f8957aaf83a9b23f2fce2ddf202e
SHA16a6b513bddbe056a570cb11f273bb26e8166a8c4
SHA256b40f13f7a6132eb3049438917a582b0a7bb53b7a65f5eee7e75f6283821b3528
SHA5123a50ddd5606d801237f1d7236e2c8d8f0bde0d38cf82b7333d26e29b9246d3c6ebe230f5eb3bba0cb02310027b1cce62d938636db814314a937a4d711f10175d
-
Filesize
7KB
MD576a264fe7f174c5c8f508278d2f5a532
SHA1533e26b3c5706ea0a1c8103cda034fb3fda36bc8
SHA2564f3cdae31bc31e12024e9ef46e5743df3e71e93de4fed76dce01264e59f94d41
SHA5122f7f752bff11041ad102b36ba493f57a7192062cb5a42721ee03a4f5e53c1f87fc5fc8d7ab271f94deb3d33b7579f316eb3ae700371d888fb7a87289e6143be1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59b44c83f7b63b849560863a8ba35acc6
SHA143665e701035cad0e6052112455b6cac78b580da
SHA256c7d061cc85029cfcc1594f89aeb7a46459ccfda8eb1ba338bd78cc9042036a4b
SHA5124c69a44c9f05388846b7c00c523e74da8dca47a2d27d0fa6ccfcb5f763e4d73fe8b969d642d169df2e0a5fa852406a453162ddf23c23ecfddc9389be9a629e71